Implementing Secure Routable GOOSE and SV Messages Based on IEC 61850-90-5

Next generation power systems are active networks that handle two-way power flow. They are equipped with extensive communication capabilities to perform dynamic monitoring, protection and control operations. Synchrophasors provide a pseudo real-time representation of grid's current state. Phaso...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 8; pp. 26162 - 26171
Main Authors Ustun, Taha Selim, Farooq, Shaik Mullapathi, Hussain, S. M. Suhail
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Next generation power systems are active networks that handle two-way power flow. They are equipped with extensive communication capabilities to perform dynamic monitoring, protection and control operations. Synchrophasors provide a pseudo real-time representation of grid's current state. Phasor Measurement Units (PMU) placed in different parts of the grid periodically collect synchrophasor data. Then, they send it to a Phasor Data Concentrator (PDCs) through Wide Area Monitoring Systems (WAMS). The entire system formed as PMU Communication Network (PMU-CN) is based on two available frameworks: IEEE C37.118.2 and IEC 61850-90-5. As New York Blackout of 2003 showed that accurate and timely delivery of phasor measurements is vital for secure grid operation. Attacks on PMU-CN may lead to several consequences in the grid and cause physical damage. IEEE C37.118.2 does not specify any security mechanism to mitigate security attacks. To address this gap, security mechanism specified in IEC 61850-90-5 have been implemented using OpenSSL library. A novel toolbox called R-GoSV has been developed to construct PMU messages with cybersecurity mechanisms. Thanks to this tool, custom messages have been transmitted in the network to investigate their effectiveness. Finally, the performance evaluation of the specified security algorithms in terms of computational time sis carried out.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2020.2971011